Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptography and Public Key Infrastructure on the Internet

Buy
Cryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:

* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation,
* the difference between the SSL protocol and the IPSec standard,
* integration of cryptography into the different OSI-layers, and how to decide whether hardware or software solutions are the right means to achieve this.
The book also includes sections on::
* standardisation
* authentication
* elliptic curve cryptography
* chip cards
* algorithm modes and protocols - including SSL, TLS, IPSec, SMIME and PGP protocols
* cryptography's connection with biometry (using biological characteristics for authentication purposes).

Cryptography and Public Key Infrastructure on the Internet is an indispensable guide for all levels of reader. It contains valuable reference material about statutes and standards affecting encryption, which companies are active in the market, and a reference guide to people, organisations, books and websites to go to for further information.
(HTML tags aren't allowed.)

OpenGL Data Visualization Cookbook
OpenGL Data Visualization Cookbook

Over 35 hands-on recipes to create impressive, stunning visuals for a wide range of real-time, interactive applications using OpenGL

About This Book

  • Get acquainted with a set of fundamental OpenGL primitives and concepts that enable users to create stunning visuals of arbitrarily complex 2D and 3D...
Embedded Systems Architecture for Agile Development: A Layers-Based Model
Embedded Systems Architecture for Agile Development: A Layers-Based Model

Utilize a new layers-based development model for embedded systems using Agile techniques for software architecture and management. Firmware is comprised of both hardware and software, but the applicability of Agile in embedded systems development is new. This book provides a step-by-step process showing how this is...

Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE

Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs.

API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of exposing business functionalities to the outside world....


Game Theory: Introduction and Applications
Game Theory: Introduction and Applications
This textbook is primarily aimed at students undertaking advanced undergraduate courses or introductory postgraduate courses, which incorporate economic applications of game theory. Following the widespread use of game theory in economics such courses are now common in many universities. Although quite a number of textbooks have recently been...
Bethesda Handbook of Clinical Oncology
Bethesda Handbook of Clinical Oncology

Written by clinicians from the National Cancer Institute and other leading institutions, this comprehensive, clear, concise oncology handbook is designed specifically for quick bedside consultation. It covers all malignancies and offers busy clinicians practical guidelines on daily patient management. The user-friendly format...

C++ Pocket Reference
C++ Pocket Reference

C++ is a complex language with many subtle facets. This is especially true when it comes to object-oriented and template programming. The C++ Pocket Reference is a memory aid for C++ programmers, enabling them to quickly look up usage and syntax for unfamiliar and infrequently used aspects of the language. The book's small...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy